ruby-changes:22456
From: nobu <ko1@a...>
Date: Thu, 9 Feb 2012 12:25:24 +0900 (JST)
Subject: [ruby-changes:22456] nobu:r34505 (trunk, ruby_1_9_3): * remove trailing spaces.
nobu 2012-02-09 12:25:07 +0900 (Thu, 09 Feb 2012) New Revision: 34505 http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=rev&revision=34505 Log: * remove trailing spaces. Modified files: branches/ruby_1_9_3/ext/bigdecimal/bigdecimal.c branches/ruby_1_9_3/ext/openssl/ossl_asn1.c branches/ruby_1_9_3/ext/openssl/ossl_cipher.c branches/ruby_1_9_3/ext/openssl/ossl_digest.c branches/ruby_1_9_3/ext/openssl/ossl_engine.c branches/ruby_1_9_3/ext/openssl/ossl_x509name.c branches/ruby_1_9_3/ext/readline/readline.c branches/ruby_1_9_3/ext/socket/ancdata.c branches/ruby_1_9_3/io.c trunk/ChangeLog trunk/ext/openssl/ossl_cipher.c trunk/ext/openssl/ossl_x509name.c Index: ChangeLog =================================================================== --- ChangeLog (revision 34504) +++ ChangeLog (revision 34505) @@ -46,9 +46,9 @@ * ext/openssl/ossl_x509name.c: Use the numerical representation of unrecognized OIDs instead of the sn "UNDEF". - + * test/openssl/test_x509name.rb: Add tests for the fixed behavior. - + Patch provided by Paul Kehrer, thank you! [ruby-core:41769] [Feature #5787] Index: ext/openssl/ossl_cipher.c =================================================================== --- ext/openssl/ossl_cipher.c (revision 34504) +++ ext/openssl/ossl_cipher.c (revision 34505) @@ -337,7 +337,7 @@ * Encrypts data in a streaming fashion. Hand consecutive blocks of data * to the +update+ method in order to encrypt it. Returns the encrypted * data chunk. When done, the output of Cipher#final should be additionally - * added to the result. + * added to the result. * * === Parameters * +data+ is a nonempty string. @@ -690,7 +690,7 @@ * as an IV. There are elaborate ways how an attacker can take advantage * of such an IV. As a general rule of thumb, exposing the key directly * or indirectly should be avoided at all cost and exceptions only be - * made with good reason. + * made with good reason. * * === Calling Cipher#final * Index: ext/openssl/ossl_x509name.c =================================================================== --- ext/openssl/ossl_x509name.c (revision 34504) +++ ext/openssl/ossl_x509name.c (revision 34505) @@ -253,7 +253,7 @@ short_name = OBJ_nid2sn(nid); vname = rb_str_new2(short_name); /*do not free*/ } - ary = rb_ary_new3(3, + ary = rb_ary_new3(3, vname, rb_str_new((const char *)entry->value->data, entry->value->length), INT2FIX(entry->value->type)); Index: ruby_1_9_3/io.c =================================================================== --- ruby_1_9_3/io.c (revision 34504) +++ ruby_1_9_3/io.c (revision 34505) @@ -5500,7 +5500,7 @@ * be passed the opened +file+ as an argument, and the File object will * automatically be closed when the block terminates. In this instance, * <code>File.open</code> returns the value of the block. - * + * * See IO.new for a list of values for the +opt+ parameter. */ Index: ruby_1_9_3/ext/bigdecimal/bigdecimal.c =================================================================== --- ruby_1_9_3/ext/bigdecimal/bigdecimal.c (revision 34504) +++ ruby_1_9_3/ext/bigdecimal/bigdecimal.c (revision 34505) @@ -4335,7 +4335,7 @@ VpAsgn(c, a, VpGetSign(b)); VpSetZero(r,VpGetSign(a)); goto Exit; - } + } word_a = a->Prec; word_b = b->Prec; Index: ruby_1_9_3/ext/readline/readline.c =================================================================== --- ruby_1_9_3/ext/readline/readline.c (revision 34504) +++ ruby_1_9_3/ext/readline/readline.c (revision 34505) @@ -166,7 +166,7 @@ } } } -#endif +#endif c = rb_funcall(readline_instream, id_getbyte, 0, 0); if (NIL_P(c)) return EOF; return NUM2CHR(c); Index: ruby_1_9_3/ext/openssl/ossl_engine.c =================================================================== --- ruby_1_9_3/ext/openssl/ossl_engine.c (revision 34504) +++ ruby_1_9_3/ext/openssl/ossl_engine.c (revision 34505) @@ -118,7 +118,7 @@ /* Need a ref count of two here because of ENGINE_free being * called internally by OpenSSL when moving to the next ENGINE * and by us when releasing the ENGINE reference */ - ENGINE_up_ref(e); + ENGINE_up_ref(e); WrapEngine(klass, obj, e); rb_ary_push(ary, obj); } Index: ruby_1_9_3/ext/openssl/ossl_cipher.c =================================================================== --- ruby_1_9_3/ext/openssl/ossl_cipher.c (revision 34504) +++ ruby_1_9_3/ext/openssl/ossl_cipher.c (revision 34505) @@ -337,7 +337,7 @@ * Encrypts data in a streaming fashion. Hand consecutive blocks of data * to the +update+ method in order to encrypt it. Returns the encrypted * data chunk. When done, the output of Cipher#final should be additionally - * added to the result. + * added to the result. * * === Parameters * +data+ is a nonempty string. @@ -690,7 +690,7 @@ * as an IV. There are elaborate ways how an attacker can take advantage * of such an IV. As a general rule of thumb, exposing the key directly * or indirectly should be avoided at all cost and exceptions only be - * made with good reason. + * made with good reason. * * === Calling Cipher#final * Index: ruby_1_9_3/ext/openssl/ossl_digest.c =================================================================== --- ruby_1_9_3/ext/openssl/ossl_digest.c (revision 34504) +++ ruby_1_9_3/ext/openssl/ossl_digest.c (revision 34505) @@ -409,7 +409,7 @@ * data1 = File.read('file1') * sha256 = OpenSSL::Digest::SHA256.new * digest1 = sha256.digest(data1) - * + * * data2 = File.read('file2') * sha256.reset * digest2 = sha256.digest(data2) Index: ruby_1_9_3/ext/openssl/ossl_asn1.c =================================================================== --- ruby_1_9_3/ext/openssl/ossl_asn1.c (revision 34504) +++ ruby_1_9_3/ext/openssl/ossl_asn1.c (revision 34505) @@ -869,7 +869,7 @@ rb_ary_push(ary, value); if (length > 0) length -= inner_read; - + if (infinite && NUM2INT(ossl_asn1_get_tag(value)) == V_ASN1_EOC && SYM2ID(ossl_asn1_get_tag_class(value)) == sUNIVERSAL) { Index: ruby_1_9_3/ext/openssl/ossl_x509name.c =================================================================== --- ruby_1_9_3/ext/openssl/ossl_x509name.c (revision 34504) +++ ruby_1_9_3/ext/openssl/ossl_x509name.c (revision 34505) @@ -253,7 +253,7 @@ short_name = OBJ_nid2sn(nid); vname = rb_str_new2(short_name); /*do not free*/ } - ary = rb_ary_new3(3, + ary = rb_ary_new3(3, vname, rb_str_new((const char *)entry->value->data, entry->value->length), INT2FIX(entry->value->type)); Index: ruby_1_9_3/ext/socket/ancdata.c =================================================================== --- ruby_1_9_3/ext/socket/ancdata.c (revision 34504) +++ ruby_1_9_3/ext/socket/ancdata.c (revision 34505) @@ -1380,7 +1380,7 @@ discard_cmsg(struct cmsghdr *cmh, char *msg_end, int msg_peek_p) { # if !defined(FD_PASSING_WORK_WITH_RECVMSG_MSG_PEEK) - /* + /* * FreeBSD 8.2.0, NetBSD 5 and MacOS X Snow Leopard doesn't * allocate fds by recvmsg with MSG_PEEK. * [ruby-dev:44189] -- ML: ruby-changes@q... Info: http://www.atdot.net/~ko1/quickml/